CVE-2021-3478

EUVD-2021-26800
There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 65%
Affected Products (NVD)
VendorProductVersion
openexropenexr
𝑥
< 2.4.3
openexropenexr
2.5.0 ≤
𝑥
< 2.5.4
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bookworm
3.1.5-5
fixed
bullseye
2.5.4-2+deb11u1
fixed
bullseye (security)
2.5.4-2+deb11u1
fixed
sid
3.1.5-5.1
fixed
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openexr
bionic
Fixed 2.2.0-11.1ubuntu1.6
released
focal
Fixed 2.3.0-6ubuntu0.5
released
groovy
Fixed 2.5.3-2ubuntu0.2
released
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
dne
xenial
Fixed 2.2.0-10ubuntu2.6
released